The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] system(3186hit)

221-240hit(3186hit)

  • Packet-Oriented Erasure Correcting Codes by Bit-Level Shift Operation and Exclusive OR

    Yuta HANAKI  Takayuki NOZAKI  

     
    PAPER-Erasure Correction

      Vol:
    E102-A No:12
      Page(s):
    1622-1630

    This paper constructs packet-oriented erasure correcting codes and their systematic forms for the distributed storage systems. The proposed codes are encoded by exclusive OR and bit-level shift operation. By the shift operation, the encoded packets are slightly longer than the source packets. This paper evaluates the extra length of the encoded packets, called overhead, and shows that the proposed codes have smaller overheads than the zigzag decodable codes, which are existing codes using bit-level shift operation and exclusive OR.

  • New Sub-Band Adaptive Volterra Filter for Identification of Loudspeaker

    Satoshi KINOSHITA  Yoshinobu KAJIKAWA  

     
    PAPER-Digital Signal Processing

      Vol:
    E102-A No:12
      Page(s):
    1946-1955

    Adaptive Volterra filters (AVFs) are usually used to identify nonlinear systems, such as loudspeaker systems, and ordinary adaptive algorithms can be used to update the filter coefficients of AVFs. However, AVFs require huge computational complexity even if the order of the AVF is constrained to the second order. Improving calculation efficiency is therefore an important issue for the real-time implementation of AVFs. In this paper, we propose a novel sub-band AVF with high calculation efficiency for second-order AVFs. The proposed sub-band AVF consists of four parts: input signal transformation for a single sub-band AVF, tap length determination to improve calculation efficiency, switching the number of sub-bands while maintaining the estimation accuracy, and an automatic search for an appropriate number of sub-bands. The proposed sub-band AVF can improve calculation efficiency for which the dominant nonlinear components are concentrated in any frequency band, such as loudspeakers. A simulation result demonstrates that the proposed sub-band AVF can realize higher estimation accuracy than conventional efficient AVFs.

  • QSL: A Specification Language for E-Questionnaire, E-Testing, and E-Voting Systems

    Yuan ZHOU  Yuichi GOTO  Jingde CHENG  

     
    PAPER-Data Engineering, Web Information Systems

      Pubricized:
    2019/08/19
      Vol:
    E102-D No:11
      Page(s):
    2159-2175

    Many kinds of questionnaires, testing, and voting are performed in some completely electronic ways to do questions and answers on the Internet as Web applications, i.e. e-questionnaire systems, e-testing systems, and e-voting systems. Because there is no unified communication tool among the stakeholders of e-questionnaire, e-testing, and e-voting systems, until now, all the e-questionnaire, e-testing, and e-voting systems are designed, developed, used, and maintained in various ad hoc ways. As a result, the stakeholders are difficult to communicate to implement the systems, because there is neither an exhaustive requirement list to have a grasp of the overall e-questionnaire, e-testing, and e-voting systems nor a standardized terminology for these systems to avoid ambiguity. A general-purpose specification language to provide a unified description way for specifying various e-questionnaire, e-testing, and e-voting systems can solve the problems such that the stakeholders can refer to and use the complete requirements and standardized terminology for better communications, and can easily and unambiguously specify all the requirements of systems and services of e-questionnaire, e-testing, and e-voting, even can implement the systems. In this paper, we propose the first specification language, named “QSL,” with a standardized, consistent, and exhaustive list of requirements for specifying various e-questionnaire, e-testing, and e-voting systems such that the specifications can be used as the precondition of automatically generating e-questionnaire, e-testing, and e-voting systems. The paper presents our design addressing that QSL can specify all the requirements of various e-questionnaire, e-testing, and e-voting systems in a structured way, evaluates its effectiveness, performs real applications using QSL in case of e-questionnaire, e-testing, and e-voting systems, and shows various QSL applications for providing convenient QSL services to stakeholders.

  • Subjective Super-Resolution Model on Coarse High-Speed LED Display in Combination with Pseudo Fixation Eye Movements Open Access

    Toyotaro TOKIMOTO  Shintaro TOKIMOTO  Kengo FUJII  Shogo MORITA  Hirotsugu YAMAMOTO  

     
    INVITED PAPER

      Vol:
    E102-C No:11
      Page(s):
    780-788

    We propose a method to realize a subjective super-resolution on a high-speed LED display, which dynamically shows a set of four neighboring pixels on every LED pixel. We have experimentally confirmed the subjective super-resolution effect. This paper proposes a subjective super-resolution hypothesis in human visual system and reports simulation results with pseudo fixation eye movements.

  • Personalized Trip Planning Considering User Preferences and Environmental Variables with Uncertainty

    Mingu KIM  Seungwoo HONG  Il Hong SUH  

     
    PAPER-Artificial Intelligence, Data Mining

      Pubricized:
    2019/07/24
      Vol:
    E102-D No:11
      Page(s):
    2195-2204

    Personalized trip planning is a challenging problem given that places of interest should be selected according to user preferences and sequentially arranged while satisfying various constraints. In this study, we aimed to model various uncertain aspects that should be considered during trip planning and efficiently generate personalized plans that maximize user satisfaction based on preferences and constraints. Specifically, we propose a probabilistic itinerary evaluation model based on a hybrid temporal Bayesian network that determines suitable itineraries considering preferences, constraints, and uncertain environmental variables. The model retrieves the sum of time-weighted user satisfaction, and ant colony optimization generates the trip plan that maximizes the objective function. First, the optimization algorithm generates candidate itineraries and evaluates them using the proposed model. Then, we improve candidate itineraries based on the evaluation results of previous itineraries. To validate the proposed trip planning approach, we conducted an extensive user study by asking participants to choose their preferred trip plans from options created by a human planner and our approach. The results show that our approach provides human-like trip plans, as participants selected our generated plans in 57% of the pairs. We also evaluated the efficiency of the employed ant colony optimization algorithm for trip planning by performance comparisons with other optimization methods.

  • A New Formula to Compute the NLMS Algorithm at a Computational Complexity of O(2N)

    Kiyoshi NISHIYAMA  Masahiro SUNOHARA  Nobuhiko HIRUMA  

     
    LETTER-Digital Signal Processing

      Vol:
    E102-A No:11
      Page(s):
    1545-1549

    The least mean squares (LMS) algorithm has been widely used for adaptive filtering because of easily implementing at a computational complexity of O(2N) where N is the number of taps. The drawback of the LMS algorithm is that its performance is sensitive to the scaling of the input. The normalized LMS (NLMS) algorithm solves this problem on the LMS algorithm by normalizing with the sliding-window power of the input; however, this normalization increases the computational cost to O(3N) per iteration. In this work, we derive a new formula to strictly perform the NLMS algorithm at a computational complexity of O(2N), that is referred to as the C-NLMS algorithm. The derivation of the C-NLMS algorithm uses the H∞ framework presented previously by one of the authors for creating a unified view of adaptive filtering algorithms. The validity of the C-NLMS algorithm is verified using simulations.

  • Multi-Autonomous Robot Enhanced Ad-Hoc Network under Uncertain and Vulnerable Environment Open Access

    Ming FENG  Lijun QIAN  Hao XU  

     
    INVITED PAPER

      Pubricized:
    2019/04/26
      Vol:
    E102-B No:10
      Page(s):
    1925-1932

    This paper studies the problem of real-time routing in a multi-autonomous robot enhanced network at uncertain and vulnerable tactical edge. Recent network protocols, such as opportunistic mobile network routing protocols, engaged social network in communication network that can increase the interoperability by using social mobility and opportunistic carry and forward routing algorithms. However, in practical harsh environment such as a battlefield, the uncertainty of social mobility and complexity of vulnerable environment due to unpredictable physical and cyber-attacks from enemy, would seriously affect the effectiveness and practicality of these emerging network protocols. This paper presents a GT-SaRE-MANET (Game Theoretic Situation-aware Robot Enhanced Mobile Ad-hoc Network) routing protocol that adopt the online reinforcement learning technique to supervise the mobility of multi-robots as well as handle the uncertainty and potential physical and cyber attack at tactical edge. Firstly, a set of game theoretic mission oriented metrics has been introduced to describe the interrelation among network quality, multi-robot mobility as well as potential attacking activities. Then, a distributed multi-agent game theoretic reinforcement learning algorithm has been developed. It will not only optimize GT-SaRE-MANET routing protocol and the mobility of multi-robots online, but also effectively avoid the physical and/or cyber-attacks from enemy by using the game theoretic mission oriented metrics. The effectiveness of proposed design has been demonstrated through computer aided simulations and hardware experiments.

  • Basic Study of Both-Sides Retrodirective System for Minimizing the Leak Energy in Microwave Power Transmission Open Access

    Takayuki MATSUMURO  Yohei ISHIKAWA  Naoki SHINOHARA  

     
    PAPER

      Vol:
    E102-C No:10
      Page(s):
    659-665

    In the beam-type microwave power transmission system, it is required to minimize the interference with communication and the influence on the human body. Retrodirective system that re-radiates a beam in the direction of arrival of a signal is well known as a beam control technique for accurate microwave power transmission. In this paper, we newly propose to apply the retrodirective system to both transmitting and receiving antennas. The leakage to the outside of the system is expected to minimize self-convergently while following the atmospheric fluctuation and the antenna movement by repeating the retrodirective between the transmitting and receiving antenna in this system. We considered this phenomenon theoretically using an infinite array antenna model. Finally, it has been shown by the equivalent circuit simulation that stable transmission can be realized by oscillating the system.

  • Hardware-Based Principal Component Analysis for Hybrid Neural Network Trained by Particle Swarm Optimization on a Chip

    Tuan Linh DANG  Yukinobu HOSHINO  

     
    PAPER-Neural Networks and Bioengineering

      Vol:
    E102-A No:10
      Page(s):
    1374-1382

    This paper presents a hybrid architecture for a neural network (NN) trained by a particle swarm optimization (PSO) algorithm. The NN is implemented on the hardware side while the PSO is executed by a processor on the software side. In addition, principal component analysis (PCA) is also applied to reduce correlated information. The PCA module is implemented in hardware by the SystemVerilog programming language to increase operating speed. Experimental results showed that the proposed architecture had been successfully implemented. In addition, the hardware-based NN trained by PSO (NN-PSO) program was faster than the software-based NN trained by the PSO program. The proposed NN-PSO with PCA also obtained better recognition rates than the NN-PSO without-PCA.

  • A Note on the Zero-Difference Balanced Functions with New Parameters

    Shanding XU  Xiwang CAO  Jian GAO  

     
    LETTER-Cryptography and Information Security

      Vol:
    E102-A No:10
      Page(s):
    1402-1405

    As a generalization of perfect nonlinear (PN) functions, zero-difference balanced (ZDB) functions play an important role in coding theory, cryptography and communications engineering. Inspired by a foregoing work of Liu et al. [1], we present a class of ZDB functions with new parameters based on the cyclotomy in finite fields. Employing these ZDB functions, we obtain simultaneously optimal constant composition codes and perfect difference systems of sets.

  • A Diversity Metric Based Study on the Correlation between Diversity and Security

    Qing TONG  Yunfei GUO  Hongchao HU  Wenyan LIU  Guozhen CHENG  Ling-shu LI  

     
    PAPER-Dependable Computing

      Pubricized:
    2019/07/16
      Vol:
    E102-D No:10
      Page(s):
    1993-2003

    Software diversity can be utilized in cyberspace security to defend against the zero-day attacks. Existing researches have proved the effectiveness of diversity in bringing security benefits, but few of them touch the problem that whether there is a positive correlation between the security and the diversity. In addition, there is little guidance on how to construct an effective diversified system. For that, this paper develops two diversity metrics based on system attribute matrix, proposes a diversity measurement and verifies the effectiveness of the measurement. Through several simulations on the diversified systems which use voting strategy, the relationship between diversity and security is analyzed. The results show that there is an overall positive correlation between security and diversity. Though some cases are against the correlation, further analysis is made to explain the phenomenon. In addition, the effect of voting strategy is also discussed through simulations. The results show that the voting strategy have a dominant impact on the security, which implies that security benefits can be obtained only with proper strategies. According to the conclusions, some guidance is provided in constructing a more diversified as well as securer system.

  • Channel-Alignment Based Non-Orthogonal Multiple Access Techniques

    Changyong SHIN  Se-Hyoung CHO  

     
    LETTER-Communication Theory and Signals

      Vol:
    E102-A No:10
      Page(s):
    1431-1437

    This letter presents a non-orthogonal multiple access (NOMA) technique for a two-cell multiple-input multiple-output (MIMO) system that exploits the alignments of inter-cell interference channels and signal channels within a cluster in a cell. The proposed technique finds combiner vectors for users that align the inter-cell interference channels and the signal channels simultaneously. This technique utilizes the aligned interference and signal channels to obtain precoder matrices for base stations through which each data stream modulated by NOMA can be transmitted to the intended cluster without interference. In addition, we derive the sufficient condition for transmit and receive antenna configurations in the MIMO NOMA systems to eliminate inter-cell interference and inter-cluster interference simultaneously. Because the proposed technique effectively suppresses the inter-cell interference, it achieves a higher degree of freedom than the existing techniques relying on an avoidance of inter-cell interference, thereby obtaining a better sum rate performance in high SNR regions. Furthermore, we present the hybrid MIMO NOMA technique, which combines the MIMO NOMA technique exploiting channel alignment with the existing techniques boosting the received signal powers. Using the benefits from these techniques, the proposed hybrid technique achieves a good performance within all SNR regions. The simulation results successfully demonstrate the effectiveness of the proposed techniques on the sum rate performance.

  • Experimental Study on a Retrodirective System Utilizing Harmonic Reradiation from Rectenna Open Access

    Tomohiko MITANI  Shogo KAWASHIMA  Naoki SHINOHARA  

     
    PAPER

      Vol:
    E102-C No:10
      Page(s):
    666-672

    A retrodirective system utilizing harmonic reradiation from a rectenna is developed and verified for long-range wireless power transfer applications, such as low-power or battery-less devices and lightweight aerial vehicles. The second harmonic generated by the rectifying circuit is used instead of a pilot signal, and thus an oscillator for creating the pilot signal is not required. The proposed retrodirective system consists of a 2.45 GHz transmitter with a two-element phased array antenna, a 4.9 GHz direction-of-arrival (DoA) estimation system, a phase control system, and a rectenna. The rectenna, consisting of a half-wave dipole antenna, receives microwave power from the 2.45 GHz transmitter and reradiates the harmonic toward the 4.9 GHz DoA estimation system. The rectenna characteristics and experimental demonstrations of the proposed retrodirective system are described. From measurement results, the dc output power pattern for the developed retrodirective system is in good agreement with that obtained using manual beam steering. The measured DoA estimation errors are within the range of -2.4° to 4.8°.

  • Geometric Dilution of Precision for Received Signal Strength in the Wireless Sensor Networks Open Access

    Wanchun LI  Yifan WEI  Ping WEI  Hengming TAI  Xiaoyan PENG  Hongshu LIAO  

     
    LETTER-Mobile Information Network and Personal Communications

      Vol:
    E102-A No:9
      Page(s):
    1330-1332

    Geometric dilution of precision (GDOP) is a measure showing the positioning accuracy at different spatial locations in location systems. Although expressions of GDOP for the time of arrival (TOA), time difference of arrival (TDOA), and angle of arrival (AOA) systems have been developed, no closed form expression of GDOP are available for the received signal strength (RSS) system. This letter derives an explicit GDOP expression utilizing the RSS measurement in the wireless sensor networks.

  • Latent Variable Based Anomaly Detection in Network System Logs

    Kazuki OTOMO  Satoru KOBAYASHI  Kensuke FUKUDA  Hiroshi ESAKI  

     
    PAPER-Network Operation Support

      Pubricized:
    2019/06/07
      Vol:
    E102-D No:9
      Page(s):
    1644-1652

    System logs are useful to understand the status of and detect faults in large scale networks. However, due to their diversity and volume of these logs, log analysis requires much time and effort. In this paper, we propose a log event anomaly detection method for large-scale networks without pre-processing and feature extraction. The key idea is to embed a large amount of diverse data into hidden states by using latent variables. We evaluate our method with 12 months of system logs obtained from a nation-wide academic network in Japan. Through comparisons with Kleinberg's univariate burst detection and a traditional multivariate analysis (i.e., PCA), we demonstrate that our proposed method achieves 14.5% higher recall and 3% higher precision than PCA. A case study shows detected anomalies are effective information for troubleshooting of network system faults.

  • Single Failure Recovery Method for Erasure Coded Storage System with Heterogeneous Devices Open Access

    Yingxun FU  Junyi GUO  Li MA  Jianyong DUAN  

     
    LETTER-Data Engineering, Web Information Systems

      Pubricized:
    2019/06/14
      Vol:
    E102-D No:9
      Page(s):
    1865-1869

    As the demand of data reliability becomes more and more larger, most of today's storage systems adopt erasure codes to assure the data could be reconstructed when suffering from physical device failures. In order to fast recover the lost data from a single failure, recovery optimization methods have attracted a lot of attention in recent years. However, most of the existing optimization methods focus on homogeneous devices, ignoring the fact that the storage devices are usually heterogeneous. In this paper, we propose a new recovery optimization method named HSR (Heterogeneous Storage Recovery) method, which uses both loads and speed rate among physical devices as the optimization target, in order to further improve the recovery performance for heterogeneous devices. The experiment results show that, compared to existing popular recovery optimization methods, HSR method gains much higher recovery speed over heterogeneous storage devices.

  • A Feasibility Study on the Safety Confirmation System Using NFC and UHF Band RFID Tags

    Shigeki TAKEDA  Kenichi KAGOSHIMA  Masahiro UMEHIRA  

     
    LETTER-System Construction Techniques

      Pubricized:
    2019/06/04
      Vol:
    E102-D No:9
      Page(s):
    1673-1675

    This letter presents the safety confirmation system based on Near Field Communication (NFC) and Ultra High Frequency (UHF) band Radio Frequency IDentification (RFID) tags. Because these RFID tags can operate without the need for internal batteries, the proposed safety confirmation system is effective during large-scale disasters that cause loss of electricity and communication infrastructures. Sharing safety confirmation data between the NFC and UHF band RFID tags was studied to confirm the feasibility of the data sharing. The prototype of the proposed system was fabricated, confirming the feasibility of the proposed safety confirmation system.

  • Marked Temporal Point Processes for Trip Demand Prediction in Bike Sharing Systems

    Maya OKAWA  Yusuke TANAKA  Takeshi KURASHIMA  Hiroyuki TODA  Tomohiro YAMADA  

     
    PAPER-Business Support

      Pubricized:
    2019/06/17
      Vol:
    E102-D No:9
      Page(s):
    1635-1643

    With the acceptance of social sharing, public bike sharing services have become popular worldwide. One of the most important tasks in operating a bike sharing system is managing the bike supply at each station to avoid either running out of bicycles or docks to park them. This requires the system operator to redistribute bicycles from overcrowded stations to under-supplied ones. Trip demand prediction plays a crucial role in improving redistribution strategies. Predicting trip demand is a highly challenging problem because it is influenced by multiple levels of factors, both environmental and individual, e.g., weather and user characteristics. Although several existing studies successfully address either of them in isolation, no framework exists that can consider all factors simultaneously. This paper starts by analyzing trip data from real-world bike-sharing systems. The analysis reveals the interplay of the multiple levels of the factors. Based on the analysis results, we develop a novel form of the point process; it jointly incorporates multiple levels of factors to predict trip demand, i.e., predicting the pick-up and drop-off levels in the future and when over-demand is likely to occur. Our extensive experiments on real-world bike sharing systems demonstrate the superiority of our trip demand prediction method over five existing methods.

  • Suzaku: A Churn Resilient and Lookup-Efficient Key-Order Preserving Structured Overlay Network

    Kota ABE  Yuuichi TERANISHI  

     
    PAPER-Network

      Pubricized:
    2019/03/05
      Vol:
    E102-B No:9
      Page(s):
    1885-1894

    A key-order preserving structured overlay network is a class of structured overlay network that preserves, in its structure, the order of keys to support efficient range queries. This paper presents a novel key-order preserving structured overlay network “Suzaku”. Similar to the conventional Chord#, Suzaku uses a periodically updated finger table as a routing table, but extends its uni-directional finger table to bi-directional, which achieves ⌈log2 n⌉-1 maximum lookup hops in the converged state. Suzaku introduces active and passive bi-directional finger table update algorithms for node insertion and deletion. This method maintains good lookup performance (lookup hops increase nearly logarithmically against n) even in churn situations. As well as its good performance, the algorithms of Suzaku are simple and easy to implement. This paper describes the principles of Suzaku, followed by simulation evaluations, in which it showed better performance than the conventional networks, Chord# and Skip Graph.

  • APS: Audience Presentation System Using Mobile Devices Open Access

    Haeyoung LEE  

     
    LETTER-Educational Technology

      Pubricized:
    2019/06/04
      Vol:
    E102-D No:9
      Page(s):
    1887-1889

    It is not easy for a student to present a question or comment to the lecturer and other students in large classes. This paper introduces a new audience presentation system (APS), which creates slide presentations of students' mobile responses in the classroom. Experimental surveys demonstrate the utility of this APS for classroom interactivity.

221-240hit(3186hit)